ProxmarkPro - Using HID Brute

May 21, 2019

This blog post covers how to do a brute force attack with a HID tag on the ProxmarkPro. A Brute force attack is done by trying to guess multiple tag UID's similar to a known working tag UID to gain access. 

For this post you will need the following:

There will be no client setup necessary for this post. Everything will be done using Unchained mode on the ProxmarkPro. We will be using a HID tag that is already saved on the SD Card to start the brute force process.

HID Brute with ProxmarkPro

1. Connect the LF Antenna and navigate to the Load Tag Menu option. Select HID and then your desired Tag. We will be using a Tag that we have named Office on the SD Card.

Load Tag

2. Navigate to the HID menu and then the Brute option.

Brute

3. In the Brute menu select Method, Card Random. Select From Current. The current tag loaded will now be set for the Brute.

Card Random


4. In the Brute menu select Start. The ProxmarkPro will now attempt to do a brute force attack on the reader with card numbers similar to the tag you have loaded.

Start


Note: In the brute menu You also have the option to manually change the HID tag UID, Facility Code, and format length. Some readers may require a faster or slower replay rate, you can change this as well in the menu options.






Also in Blog

Proxmark Pro - Sniffing a Mifare Desfire 4K Tag
Proxmark Pro - Sniffing a Mifare Desfire 4K Tag

October 21, 2019

This post covers how to Sniff a Mifare Desfire 4K tag with the ProxmarkPro.

View full article →

ProxmarkPro - Sniffing a Mifare 4K Tag
ProxmarkPro - Sniffing a Mifare 4K Tag

October 21, 2019

This post covers how to Sniff a Mifare 4K tag with the ProxmarkPro.

View full article →

ProxmarkPro - Sniffing a Mifare 1K Tag
ProxmarkPro - Sniffing a Mifare 1K Tag

October 21, 2019

This post covers how to sniff a Mifare 1K tag with the ProxmarkPro.

View full article →

We use cookies to ensure that we give you the best experience on our website. If you continue we'll assume that you are understand this. Learn more
Accept